RF Cafe Software
About RF Cafe
1996 - 2016
BSEE - KB3UON
RF Cafe began life in 1996 as "RF Tools" in an AOL screen name web space totaling 2 MB. Its primary purpose was to provide me with ready access to commonly needed formulas and reference material while performing my work as an RF system and circuit design engineer. The Internet was still largely an unknown entity at the time and not much was available in the form of WYSIWYG ...
All trademarks, copyrights, patents, and other rights of ownership to images and text used on the RF Cafe website are hereby acknowledged.
My Hobby Website:
Try Using SEARCH
to Find What You Need.
There are 1,000s of Pages Indexed on RF Cafe !
The good folks at IMS ExpertServices have published an interesting short article highlighting the increasingly difficult technical issues being brought before courts in intellectual property (IP) cases, and an inability by judges to render informed opinions based on evidence presented. Attorney Ryan Thompson addresses the issue in a case involving Silk Road and its use of Bitcoin payments to remain 'under the radar' of law enforcement for nearly two years. While there are some amazingly intelligent jurists in the courts, expecting any one person to possess enough knowledge of both law and the subject at hand (a circuit design, software code, a rocket engine fuel injector, an automotive braking system, computer hacking, etc.) while parsing claims and evidence, and ultimately to render a fair verdict is unreasonable - maybe even impossible. Mr. Thompson asks whether judges in the future will need to hire their own 'experts.' That's probably not a bad idea. Many of us are old enough to remember the Microsoft trial presided over by Judge Thomas Penfield Jackson, and questioning the validity of how the case was handled. The U.S. Supreme Court is also finding highly technical cases to be a challenge which its members are not qualified to judge on merit (of course their lifetime appointments exempt them from accountability).
Is it just me, or does just about everybody look really young these days? '<8O
November 25, 2014
Post your comments here.
Ryan's experience in the legal industry coupled with his work in journalism brings a unique voice to this exclusive BullsEye content. He is an assistant general counsel and writing professor at Niagara University. He has a degree in journalism from the University of Colorado and a law degree from Brooklyn Law School. Admitted to the New York bar in 2005, he previously worked at a Fifth Avenue law firm where he specialized in in-court litigation.
After black-market dealing for approximately two years in relative anonymity, the secretive Silk Road drug-dispensing site was targeted by U.S. federal authorities and was subsequently shut down. Its alleged owner and operator was arrested.
However, one lawyer and technology expert is claiming that the FBI is lying about how it found the Silk Road server that allowed authorities to seize the site as well as millions of dollars in cyber coinage. It is a complicated question of computer evidence, one which the courts may not be capable of fully understanding.
As the worlds of cybercrime, criminal law, economics, and evidence continue to collide, the technological war between law enforcement and crypto-criminals is requiring prosecutors to enter a new realm of trial advocacy and courtroom tactics – one in which tech experts and computer specialists are vital for judicial clarity and jury instructions.
At a time when iron bars and jailhouse walls can do little to stop crimes and communications from
taking place over the intangible and worldwide web connections, stopping cybercrime is one thing, but explaining it to a judge or jury is a much different task.
From Drug Money to Bonafied Bitcoins
Earlier this month, after Silk Road 2.0's alleged owner and operator, Blake "Defcon" Benthall, was arrested by the FBI, the defendant reportedly began tweeting, just hours after his arrest, from jail and requesting bitcoin donations. Many law enforcement officials didn't even know what this meant or what the defendant was soliciting.
Bitcoin is a form of cryptocurrency that has garnered international recognition in the last couple of years after it was revealed to be the form of monetary tender used to purchase drugs from the original Silk Road website.
However, the currency also opened the eyes of legitimate businessmen, economists, and financial experts as well – some of whom believe that bitcoin and other cryptocurrencies could become the money form of the future. Our BullsEye blog examined the world of bitcoins in a March 2014 article entitled "What The #!$% Is Bitcoin?"
Three months after that article's publication, the U.S. Marshal's Service held an online auction and sold nearly 30,000 of the bitcoins it had seized from Silk Road. At the time, the value was approximately $18 million. They were purchased by American venture capitalist Tim Draper, who has just brought in former SEC Chairman Arthur Levitt as an advisor for his new bitcoin-investor platform rebranded as "Mirror."
The FBI, however, claims that the auctioned bitcoins that Draper purchased represent less than a quarter of those seized from Silk Road and its alleged mastermind Ross William Ulbricht. Thirty-year-old Ulbricht, of Austin, Texas, is alleged to be the original Silk Road founder, who called himself "Dread Pirate Roberts," named after the sword-wielding character in the movie The Princess Bride. <a great movie, BTW - KRB>
In a September 2013 interview with Forbes magazine, the libertarian-minded Dread Pirate Roberts is quoted as saying, "We've won the State's War on Drugs because of Bitcoin."
Ulbricht was arrested in San Francisco just days after the article was published. He was charged with money laundering, computer hacking, conspiracy to traffic narcotics, and attempted murder of witnesses. His federal trial is expected to begin in January in Manhattan.
The FBI said that it is holding on to the 144,342 bitcoins seized from Ulbricht's computer until after the resolution of the criminal trial. Presumably, if Ulbricht is convicted and the seizure is deemed valid, the bitcoins will be auctioned off to the public. The approximate value of that cache of bitcoins is over $56 million today.
Cybercrime Confusing Courts
Expert witness and attorney Joshua J. Horowitz, however, claims in court documents released last month that the FBI is lying about how it accessed the Silk Road back-end server. In an 18-page declaration filed with the U.S. District Court for the Southern District of New York, Horowitz writes about "Nginx access logs," "tarball mtimes" and "phpmyadmin virtual host site configurations," claiming that he can show that the FBI could not have infiltrated Silk Road via the manner that it claims in the indictment and other court documents.
"[B]ased on the Silk Road Server's configuration files provided in discovery, former Special Agent [Christopher] Tarbell's explanation of how the FBI discovered the server's IP address is implausible," Horowitz states.
However, much of Horowitz's technologically sophisticated declaration is unreadable and incomprehensible to an average attorney or jurist. With many of these issues being evidentiary in nature, the question of whether certain physical evidence is admitted at trial will be left up to one judge.
How will a federal judge – many of whom were middle-aged well before Steve Jobs and Steve Wozniak began tinkering away inside a garage in 1976 – be capable of ruling on these evidentiary issues based on court documents and legal arguments that are communicated in a specialized, seemingly foreign, language?
"The critical configuration lines from the live-ssl file are: 'allow 127.0.0.1; allow 220.127.116.11; deny all;.' These lines tell the web server to allow access from IP addresses 127.0.0.1 and 18.104.22.168, and to deny all other IP addresses from connecting to the web server.… Based on this configuration, it would have been impossible for Special Agent Tarbell to access the portion of the .49 server containing the Silk Road market data, including a portion of the login page, simply by entering the IP address of the server in his browser," Horowitz writes, seemingly in an attempt to "dumb down" the explanation of the process.
While the Kentucky-born, Yale-educated U.S. District Judge J. Paul Oetken is very young compared to his life-appointed colleagues, to assume that the 49-year-old jurist (or even his law clerk) can understand even the basics of Horowitz's argument is unlikely. In order for him to rule on these evidentiary issues properly, one would assume that technology experts will need to be hired by the courts to examine the specific allegations and pretrial disputes.
Unlike the decision to admit or deny expert witnesses in federal court, during which the judge must determine whether the witness is qualified enough to proffer evidence to the jury, the decision to entirely admit or deny the actual physical evidence that was searched and seized is solely up to the judge. In the case of the Ulbricht prosecution, one would assume that allowing the FBI's evidence gathered from the Silk Road site to be admissible at trial would be far more critical than any other issues presented before the jury once the evidence is deemed admissible.
This will not be an easy decision for the judge.
"The active phpmyadmin configuration file contained in Item 1 of discovery contains the following lines: 'listen 80; root /usr/share/phpmyadmin; allow 127.0.0.1;.' These lines direct the phpmyadmin virtual host to listen on port 80, which is the standard port for web traffic, and also tells Nginx to serve files from the phpmyadmin folder. The absence of 'deny all' means that it would be possible for an IP address outside the Tor network to connect to the .49 server. However, an IP address outside the Tor network would have been able to access only the login page for phpmyadmin and the files contained in the phpmyadmin folder, not any part of the Silk Road market or even the login screen, as claimed in the Tarbell Declaration," Horowitz explains further.
If Judge Oetken thinks this is confusing, just wait until the experts start explaining what a bitcoin is.
When it comes to complicated technological issues that are procedural in nature and that are therefore not intended for the jury, will courts now need to hire experts to explain and inform judges? Or do today's judges really have no business making these highly specialized decisions on evidence?
This article was originally published in BullsEye, a newsletter distributed by IMS ExpertServices™. IMS Expert Services is the premier expert witness search firm in the legal industry, focused exclusively on providing custom expert witness searches to attorneys. To read this and other legal industry BullsEye publications, please visit IMS Expert Services' recent articles. For your next expert witness search, call us at 877-838-8464 or visit their website.
About IMS ExpertServices
Since 1992, IMS ExpertServices has located and delivered thousands of best-of-class experts across hundreds of practice areas and industries. We deliver these experts, fully vetted and conflict free, to clients that include nearly all of the AmLaw top 100 firms and two-thirds of the Fortune 100. Contact IMS ExpertServices for any additional questions on our BullsEye publications via the website, email, or toll free at 877.838.8464 and we will be glad to assist you.
Posted December 16, 2014